Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 457 (0.029 secs)
You searched for: subject:"encryption"
[1] 2 3 4 5 6 7 8 9 10     Next    Last
[image]tashfir almalfat
tashfir almalfat
Keywords: encryption
Downloads: 25
[image]takid istibdal almalf
takid istibdal almalf
Keywords: encryption
Downloads: 41
[audio]Sunshine Əиɔячpʇion REmix Ookay
downloadable
Keywords: encryption
Downloads: 8
[image]3mlia alzagt
3mliat alzagt thm tashfir
Keywords: encryption
Downloads: 23
[texts]crashsystems signed statements regarding the creation of new keys - crashsystems.net
On 15 March 2009 crashsystems created new encryption keys. These files contain identifying info about the old keys and the new keys, signed by both.
Keywords: encryption
Downloads: 136
[texts]crashsystems new key signed statements - crashsystems.net
On 15 March 2009 crashsystems (http://crashsystems.net) created new GnuPG encryption keys. These files contain statements about his old keys and new keys, the first of which is signed by the old key, the second of which is signed by the new key.
Keywords: encryption
Downloads: 126
[audio]IUMA: Digital Encryption
Digital Encryption was formed in early 1999 by sole member Neiva Neivlo. Created primarily as a project of personal expression, the project has evolved in the last year to focus on heavy trance rhythms and dance beats. While the focus has shifted from one of abstract expressionism to one of a more dance floor friendly style, much of the original creativity remains intact. Each song written by Neiva manages to retain it's own individual style and sense of rhythm...
Keywords: Digital Encryption
Downloads: 4
[texts]WEP Encryption
Have you ever wondered how to crack WEP encryption? Well this informative tutorial will walk you through cracking WEP encryption using the Aircrack-ng suite. The WRTP54G wireless router allows both older WEP encryption as well as newer WPA encryption. EarthLink recommends using WPA. But, remember that every wireless. Wireless Security WEP VS. WPA. Wireless routers allow your computer to connect to the Internet by using radio waves to carry network traffic back and forth...
Keywords: WEP Encryption
Downloads: 23
[audio]hpr1462 :: Encryption and Email with Thunderbird - Ahuka
Summary: Series: Privacy and SecuritySource: http://hackerpublicradio.org/eps.php?id=1462 Now it is time to take a look at practical uses of encryption, and the number one use is for e-mail. Encrypted communication via e-mail is very desirable if you want to keep a secret. In the U.S. the current legal precedents say that any e-mail left on a server is not protected since you would have no expectation of privacy...
Keywords: encryption; email
Downloads: 9
[audio]hpr1481 :: Encryption and Gmail - Ahuka
Summary: This looks at how you can use encryption to sign email and to privately secure it in Gmail.Series: Privacy and SecuritySource: http://hackerpublicradio.org/eps.php?id=1481 Last time we looked at how you can use GPG and Enigmail to digitally sign or encrypt messages in Thunderbird. But today many people use web-based mail, and one of the most popular is Googles Gmail. Others include Outlook.com and Yahoo, but using any of them is pretty similar...
Keywords: encryption; email
Downloads: 4
[texts]WinZIP Encryption
WinZip free download. WinZip is a compression utility for Windows and a powerful and easy-to-use tool that zips and unzips f. WinZip is the world's leading Zip utility for file compression, encryption, sharing, and data backup. File encryption is easy with WinZip. Just click 'Encrypt' to password protect your files with strong AES encrption as you zip them. Download WinZip Courier 4.5 for Windows, WinZip Courier is a compression and encryption software designed to help users zip and email files ...
Keywords: WinZIP Encryption
Downloads: 38
[texts]PDF Encryption
PDF Encryption
Keywords: PDF Encryption
Downloads: 10
[texts]Email Encryption Market Drivers, Challenges and Development Prospects - mary garcia
Browse the Report @ http://www.reportsnreports.com/reports/279841-global-email-encryption-market-2014-2018.htmlEmail encryption refers to the encryption of emails as a security measure to protect the content from unauthorized access. There are different protocols for email encryption such as PGP, S/MIME, TLS, identity-based encryption, and mail sessions encryption. These email encryption products are available either as software or as an appliance, such as a gateway device...
Keywords: email encryption; email encryption market; email encryption software; email; encryption; mail encryption
Downloads: 1
[texts]A Stick Figure Guide to the Advanced Encryption Standard (AES) - Jeff Moser
A stick figure play in 4 acts describing the history and inner workings of the Advanced Encryption Standard (AES). It goes along with a blog post at http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
Keywords: aes; advanced encryption standard; encryption; crypto; cryptography
Downloads: 163
[texts]pidgen encryption learn - pidgen encryption learn
pidgen encryption learn
Keywords: pidgen encryption learn
Downloads: 24
[texts]UncoverGame - tom wildzeiss
This is a board game in German language. It deals with easy encryption. As the game is still under development please visit the website for further information or file download. The files presented in this folder represent the preview of an early beta version.
Keywords: uncover encryption board game
Downloads: 15
[movies]ST 4U 342: Using XTea Encryption in VA - James Robertson
XTEA is a simple encryption scheme, and there's a small goodie for VA that makes using it easy. If your needs for encryption are lightweight, it might be just what you are looking for
Keywords: smalltalk; encryption; va smalltalk
Downloads: 262
[movies]Cryptic Burgess Dub - Steven Ball
Dubstep meets experimental video meets cryptology.
Keywords: encryption; dubstep; experimental; video
Downloads: 316
[movies]Encrypting and Decrypting files with Encryptstick
EncryptStick's Private Web Browser leaves no footprint, encrypting and storing all your browsing history and bookmarks on your USB stick.Encryptstick’seffective internet privacy software to circumvent the devious act of online information theft  and  hide your  valuable informations from internet hackers  just  installing this.For more click 
Keywords: drive encryption software
Downloads: 13
[movies]Fire ID Mobile Authentication Solution - encryptstick
Now avail highly effective USB password protection software from EncryptStick at most genuine price and secure your login credentials for the websites you visit. Also you can login automatically in case you forget your password using its backup facility and lost file recovery feature.
Keywords: data encryption software
Downloads: 4
[texts]pidgen encryption learn - pidgen encryption learn
pidgen encryption learn
Keywords: pidgen encryption learn
Downloads: 70
[audio]hpr1440 :: Creating a Key Pair - GUI Client - Ahuka
Summary: Using a GUI client (KGpg) to generate an RSA key pair.Duration: 00:16:06Source: http://hackerpublicradio.org/eps.php?id=1440In the previous program we explained how to use the command line tools to generate encryption keys. This time we look at the GUI clients that some people may prefer. Using KGpg as an example, we can see that it does all the things we did last time on the command line.
Keywords: Security; encryption; keys; GUI
Downloads: 6
[movies]Politics on the Web
The early internet became an instant hit with political organizations and movements that had previously felt shut out of the mainstream press. This program looks at several examples of how the web was being used for political advocacy. Maureen Mason shows us the Institute for Global Communications web site which includes links to PeaceNet, EcoNet, ConflictNet, LaborNet, and WomensNet. Eric Hughes, founder of Cypherpunks, a group working to preserve privacy on the net through encryption, explains...
Keywords: IGC; cypherpunks; encryption; anarchists
Downloads: 94,371
[texts]Mcafee Endpoint Encryption
Fanhow found 20 articles about 'mcafee endpoint encryption slow windows 7' on tutorials, qa and software. To uninstall McAfee Endpoint Encryption from your Windows XP operating system, perform the following steps Run the Start menu, and then go to Control Panel. Previously known as SafeBoot Device Encryption, the improved version of McAfees full disk encryption is ready to protect your data stored on the PC or...
Keywords: Mcafee Endpoint Encryption
Downloads: 13
[movies]Network Security
As local area networks grew, so did concerns for network security. This program looks at some early solutions. Demonstrations include FileGuard 2.5 for the Mac, MaccessCard, PhoneNET Liaison 3.0, SiteLock, SecurID, and MailSafe. Guests include security expert and author Cliff Stoll. Originally broadcast in 1991.
Keywords: virus; hacker; LAN; encryption
Downloads: 3,940 3.00 out of 5 stars3.00 out of 5 stars3.00 out of 5 stars(1 review)
[texts]Uncover Game - tom wildzeiss
This is a board game about easy encryption in German. The files in this folder represent a preview in beta status. Please visit the project website to get more information or newer versions. The project will be accessible by September 2007, likely.
Keywords: uncover encryption board game
Downloads: 180
[movies]Cyber Security
With more and more computers becoming terminals on the internet, concerns were growing for internet security. This program looks at several solutions. Included are demonstrations of Wells Fargo Online Banking, Cookie Master, anonymizer.com, a fax encryptor from InfoImaging called 3D FaxFile 2.0, a new biometric device from Oracle called HandKey, and CompuTrace, a device that calls you if your computer is stolen...
Keywords: security; encryption; cookies
Downloads: 2,948
[movies]Cyber Privacy
How do you maintain your privacy and still play in the online world? This program offers some suggestions including LPWA, the Lucent Personal Web Assistant, PGP5.5 Personal Privacy encryption software, the Anonymizer, and Firefly Networks Passport software. Also features a visit with a private investigator who deals with cyber privacy issues and a look at how eBay tries to avoid online scams. Originally broadcast in 1998.
Keywords: identity theft; fraud; encryption
Downloads: 2,068
[texts]Practical Paranoid's Book of Computer Security - Homer Otto Goodall, Jr
This book was written by me. I am currently adding more to it and I will present it to the public as it is being written.
Keywords: Antivirus; Encryption; Computer security
Downloads: 224
[texts]Status report on the first round of the development of the advanced encryption standard (Volume 104) - Nechvatal, James
Journal of Research of the National Institute of Standards and Technology
Keywords: encryption; Advanced Encryption Standard (AES); cryptanalysis; cryptographic algorithms
Downloads: 64
[texts]Image Encryption Using Advanced Hill Cipher Algorithm
The Hill cipher algorithm is one of the symmetric  key algorithms that have several advantages in data encryption. But, the inverse of the key matrix used for encrypting the plaintext does not always exist. Then if the key matrix is not invertible, then encrypted text cannot be decrypted. In the Involutory matrix generation method the key matrix used for the encryption is itself invertible. So, at  the time of decryption we need not to find the inverse of the key matrix...
Keywords: Encryption; Decryption; Hill Cipher; Image Encryption; Advanced Hill Cipher
Downloads: 304
[texts]Efficiency of Entropy Coding as well as Dictionary based Technique for Lossless Data Compression - IJRDT
Communication is exchange of information between the devices, which very important in today's life. Communication is wide utilized in all fields, such as telephone, television, weather forecasting and etc. There are different kinds of communication techniques. All the data which have to be transmitted has to be compressed in order to send more and more data. Communication is one of the main processes in many domains, but to send the information, the data has to be compressed, so that more and mo...
Keywords: Entropy; Huffman coding; Encryption; Decryption
Downloads: 1
[texts]17. Applied Towards SECURING DATA IN CLOUD Shorunke Muyiwa Musaddiq - SHORUNKE MUYIWA MUSADDIQ
Clouds are rapidly becoming a platform of choice for hosting increasingly complex application software and services. Among the attractive features they offer are elasticity and pay-as-you-go model, which allow businesses to gain access to vast computing resources with minimum upfront investment, and operational costs. Although a great deal of progress has so far been made with respect to the low-level technological underpinning of the clouds, today’s clouds are still considered to be insuffici...
Keywords: Cloud; Data; Cryptography; Encryption; Security
Downloads: 2
[movies]Super Mondays - HTML prototyping, Web standards and Encryption videos
Recorded at Super Mondays, November 2013.
Keywords: SuperMondays; Web Standards; Encryption; Prototyping
Downloads: 4
[movies]Ep23 - How To Build Your Own Free Cloud Backup Solution - Tech Chop
http://www.techchop.com - In this episode Paul shows us how you can get together with a friend or family member to create a free cloud backup solution using CrashPlan. It works on Windows, Mac, and Linux! CrashPlan: http://crashplan.com NAS: http://ninjurl.us/92zint Support the show! Do your Amazon shopping at http://amazon.techchop.com
Keywords: free; cloud; backup; encryption; crashplan
Downloads: 379
[audio]TuxJam Episode 24 - Kevie
In Tuxjam episode 24, Andrew returns to join Kevie in discussing security-related FOSS software, including Tor & Torchat, Enigmail and EncFS. Andrew talks about his new toy – the ZTE Open Firefox OS phone - and Kevie does a commendable job of avoiding the green-eyed monster since his Geeksphone will be further delayed. Thanks to @theru for alerting us to this mention of TuxJam on linuxlinks.com. Creative commons tracks played in this episode: Clarice by onsind Airplane Mode by Josh Woodward Bi...
Keywords: linux; security; encryption; tor; ccmusic
Downloads: 89
[audio]Encryption project - oceans in space
oceans in space, relative encryption
Keywords: oceans in space; relative encryption
Downloads: 22 4.00 out of 5 stars4.00 out of 5 stars4.00 out of 5 stars4.00 out of 5 stars(1 review)
[texts]Simple email encryption with FireGPG, Version 1.0 - Douglass Clem
Though the technology was once closely guarded by the United States government as a form of export controlled munitions, encryption is now freely available to the masses. However, much of the technology is not easily understandable _by_ the masses. With this in mind, "Simple email encryption with FireGPG" is written as a cross platform guide for email encryption, with a target audience of ordinary, non-technical Internet users.
Keywords: computers; security; encryption; gnupg; guide
Downloads: 335
[texts]Processed World (Volume 16) - Processed World Collective

Keywords: Space, Encryption,Library, South Africa
Downloads: 336
[texts]Code Original: Efficient & Innovative Encryption - Joseph D. Smith
Encrypt your messages in the most efficient, yet innovative manner, because the new Code Original uses cellphone numbers to create encoded messages!
Keywords: Encryption; encoded; messages; secret; cellphone
Downloads: 22
[texts]Performance Evaluation of Classifiers used for Identification of Encryption Algorithms
Evaluating classifier performance is a criticalproblem in pattern recognition and machine learning. In thispaper pattern recognition techniques were applied to identifyencryption algorithms. Four different block cipher algorithmswere considered, DES, IDEA, AES, and RC2 operating in(Electronic Codebook) ECB mode. Eight different classificationtechniques were used for this purpose, these are: NaïveBayesian (NB), Support Vector Machine (SVM), neuralnetwork (MLP), Instance based learning (IBL), Bag...
Keywords: Pattern Recognition; Classifiers; Encryption; Cryptanalysis
Downloads: 22
[software]TurboCrypt AES Dis Encryption - http://www.pmc-ciphers.com
This program provides transparent disk encryption. When a virtual encrypted volume is unlocked, it is recognized by your computer as a separate drive letter. Enter your password once to unlock the drive, and then access and use all encrypted files stored therein.
Keywords: TurboCrypt AES Dis Encryption; System and utilities; File tools; File encryption; TurboCrypt AES Dis Encryption
Downloads: 42
[software]P-Encryption Suite - http://www.cadabrasoftware.com/
This encryption program stores your private documents in a single encrypted file. It can create both stealth and normal archives. Stealth archives are PES files disguised as a different file. Archives are password-protected, and the program can encrypt e-mail and your address book. An anti-keylogger is also included.
Keywords: P-Encryption Suite; System and utilities; File tools; File encryption; P-Encryption Suite
Downloads: 75
[software]Vigilant File Encryption Software - http://www.softmode.com
This allows you to encrypt, sign or shred files, e-mail, documents, folders and Hippa data. It also creates free X.509 certificates. Drag-and-drop, escrow and multiple recipient functions are supported. You can encrypt any kind of file or folder. Encrypted files appear with a lock on the icon. You can double-click to decrypt and open, and close to automatically re-encrypt. The program also supports Aladdin and Rainbow tokens.
Keywords: Vigilant File Encryption Software; System and utilities; File tools; File encryption; Vigilant File Encryption Software
Downloads: 76
[software]Solid Encryption - http://www.solid-programs.com/
This program offers OTP encryption. You can encrypt to and from files, or directly to the clipboard. Paste cipher-text directly into text documents. You can generate random keys with a radio and a sound card.
Keywords: Solid Encryption; System and utilities; File tools; File encryption; Solid Encryption
Downloads: 41
[software]Super File Encryption - http://www.fileencryption.org
This is a program for encrypting and protecting your data. Using the context menu you can encrypt or decrypt files and folders by right-clicking on them in Explorer and selecting the encrypt or decrypt command. The software also enables you to have secure e-mail communication over the Internet, preventing unauthorized persons from reading attached files.
Keywords: Super File Encryption; System and utilities; File tools; File encryption; Super File Encryption
Downloads: 141
[software]Deltacrypt OneClick Encryption Software - http://www.deltacrypt.com
This is a file encryption program with RSA protected keys. It allows the user to encrypt and decrypt in one click, and a digital signature is appended on encrypted information and on public keys. You can encrypt any file format without volume restrictions. The delete option substitutes the content of the original source files with space characters before wiping the files out. The DeltaCrypt OneClick File Encryption software comes in a self-executable file and is menu-driven.
Keywords: Deltacrypt OneClick Encryption Software; System and utilities; File tools; File encryption; Deltacrypt Public Key File Encryption Software
Downloads: 111
[software]Advanced Encryption Package 2004 Professional - http://www.secureaction.com/encryption_pro/
This program allows you to create encrypted files and self-decrypting files. It includes a file shredder and integrates into Windows Explorer context menus. It uses military grade encryption in 17 industrial algorithms. It supports skins and ZIP files.
Keywords: Advanced Encryption Package 2004 Professional; System and utilities; File tools; File encryption; Advanced Encryption Package 2003 Professional
Downloads: 119
[movies]Perpetual Data - Paul Grignon
Interesting new network which gives all the people of the world, freedom, security and privacy. It's a huge opportunity for creativity and innovation. Inspired by all the people who changed the world for the better and all those who have yet to!
Keywords: Networking; PKI; DHT; p2p; encryption
Downloads: 21
[audio]East meets West 107 - Roger Chang and Tom Merritt
Roger and Tom talk file encryption, Wondercon, bathroom remodels, downtown LA, muscle memory and more.
Keywords: podcast; LA; wondercon; muscle memory; encryption
Downloads: 2
[1] 2 3 4 5 6 7 8 9 10     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection